Analysis
-
max time kernel
1214s -
max time network
1218s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:46
Behavioral task
behavioral1
Sample
dead.exe
Resource
win7-20220414-en
General
-
Target
dead.exe
-
Size
2.2MB
-
MD5
b3b5313f4d4d239f5d22a84ef29eb892
-
SHA1
ac0dd7326305bfee3d19b31ee56c9cbc9b3253f5
-
SHA256
7df566bbfebbfb07e45989d68668365c56d17d55b013bb30c58de0485d337067
-
SHA512
c68ead18d282247be06d05c235dc7c07ab9871358b42e9f5756aa2e43bc694dd34a5288b65d1d4d9a0092ca162f3c9aa8d7ca5f6b47ed46973a31b6334a8ba57
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
https://www.astolfo.lgbt/
https://absolllute.com/store/view_mega_hack_pro
https://x.synapse.to/
https://script-ware.com/
https://protosmasher.net/
Extracted
C:\Users\Admin\AppData\Roaming\InstallRename.html
ryuk
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1244-130-0x00000000001E0000-0x0000000000538000-memory.dmp family_chaos behavioral2/files/0x0007000000023172-136.dat family_chaos behavioral2/files/0x0007000000023172-135.dat family_chaos -
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 4252 bcdedit.exe 1084 bcdedit.exe -
Processes:
wbadmin.exepid Process 4324 wbadmin.exe -
Executes dropped EXE 1 IoCs
Processes:
chrome.exepid Process 1816 chrome.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
chrome.exedescription ioc Process File renamed C:\Users\Admin\Pictures\CompressSubmit.raw => C:\Users\Admin\Pictures\CompressSubmit.raw.tov3 chrome.exe File renamed C:\Users\Admin\Pictures\ImportExport.raw => C:\Users\Admin\Pictures\ImportExport.raw.kbmc chrome.exe File renamed C:\Users\Admin\Pictures\InstallMerge.png => C:\Users\Admin\Pictures\InstallMerge.png.fkst chrome.exe -
Processes:
resource yara_rule behavioral2/memory/1244-130-0x00000000001E0000-0x0000000000538000-memory.dmp vmprotect behavioral2/files/0x0007000000023172-136.dat vmprotect behavioral2/files/0x0007000000023172-135.dat vmprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dead.exechrome.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation dead.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation chrome.exe -
Drops startup file 3 IoCs
Processes:
chrome.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.url chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini chrome.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\readme.txt chrome.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini chrome.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini chrome.exe File opened for modification C:\Users\Public\Documents\desktop.ini chrome.exe File opened for modification C:\Users\Public\Desktop\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Videos\desktop.ini chrome.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Music\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini chrome.exe File opened for modification C:\Users\Public\Pictures\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Links\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Searches\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini chrome.exe File opened for modification C:\Users\Public\Videos\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Documents\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini chrome.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini chrome.exe File opened for modification C:\Users\Public\Music\desktop.ini chrome.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini chrome.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
chrome.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhc91ibwg.jpg" chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vds.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 4408 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 4168 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
chrome.exepid Process 1816 chrome.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
dead.exechrome.exepid Process 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1244 dead.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
dead.exechrome.exevssvc.exeWMIC.exewbengine.exedescription pid Process Token: SeDebugPrivilege 1244 dead.exe Token: SeDebugPrivilege 1816 chrome.exe Token: SeBackupPrivilege 3748 vssvc.exe Token: SeRestorePrivilege 3748 vssvc.exe Token: SeAuditPrivilege 3748 vssvc.exe Token: SeIncreaseQuotaPrivilege 3384 WMIC.exe Token: SeSecurityPrivilege 3384 WMIC.exe Token: SeTakeOwnershipPrivilege 3384 WMIC.exe Token: SeLoadDriverPrivilege 3384 WMIC.exe Token: SeSystemProfilePrivilege 3384 WMIC.exe Token: SeSystemtimePrivilege 3384 WMIC.exe Token: SeProfSingleProcessPrivilege 3384 WMIC.exe Token: SeIncBasePriorityPrivilege 3384 WMIC.exe Token: SeCreatePagefilePrivilege 3384 WMIC.exe Token: SeBackupPrivilege 3384 WMIC.exe Token: SeRestorePrivilege 3384 WMIC.exe Token: SeShutdownPrivilege 3384 WMIC.exe Token: SeDebugPrivilege 3384 WMIC.exe Token: SeSystemEnvironmentPrivilege 3384 WMIC.exe Token: SeRemoteShutdownPrivilege 3384 WMIC.exe Token: SeUndockPrivilege 3384 WMIC.exe Token: SeManageVolumePrivilege 3384 WMIC.exe Token: 33 3384 WMIC.exe Token: 34 3384 WMIC.exe Token: 35 3384 WMIC.exe Token: 36 3384 WMIC.exe Token: SeIncreaseQuotaPrivilege 3384 WMIC.exe Token: SeSecurityPrivilege 3384 WMIC.exe Token: SeTakeOwnershipPrivilege 3384 WMIC.exe Token: SeLoadDriverPrivilege 3384 WMIC.exe Token: SeSystemProfilePrivilege 3384 WMIC.exe Token: SeSystemtimePrivilege 3384 WMIC.exe Token: SeProfSingleProcessPrivilege 3384 WMIC.exe Token: SeIncBasePriorityPrivilege 3384 WMIC.exe Token: SeCreatePagefilePrivilege 3384 WMIC.exe Token: SeBackupPrivilege 3384 WMIC.exe Token: SeRestorePrivilege 3384 WMIC.exe Token: SeShutdownPrivilege 3384 WMIC.exe Token: SeDebugPrivilege 3384 WMIC.exe Token: SeSystemEnvironmentPrivilege 3384 WMIC.exe Token: SeRemoteShutdownPrivilege 3384 WMIC.exe Token: SeUndockPrivilege 3384 WMIC.exe Token: SeManageVolumePrivilege 3384 WMIC.exe Token: 33 3384 WMIC.exe Token: 34 3384 WMIC.exe Token: 35 3384 WMIC.exe Token: 36 3384 WMIC.exe Token: SeBackupPrivilege 816 wbengine.exe Token: SeRestorePrivilege 816 wbengine.exe Token: SeSecurityPrivilege 816 wbengine.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
dead.exechrome.execmd.execmd.execmd.exedescription pid Process procid_target PID 1244 wrote to memory of 1816 1244 dead.exe 84 PID 1244 wrote to memory of 1816 1244 dead.exe 84 PID 1816 wrote to memory of 4952 1816 chrome.exe 97 PID 1816 wrote to memory of 4952 1816 chrome.exe 97 PID 4952 wrote to memory of 4408 4952 cmd.exe 99 PID 4952 wrote to memory of 4408 4952 cmd.exe 99 PID 4952 wrote to memory of 3384 4952 cmd.exe 103 PID 4952 wrote to memory of 3384 4952 cmd.exe 103 PID 1816 wrote to memory of 3824 1816 chrome.exe 105 PID 1816 wrote to memory of 3824 1816 chrome.exe 105 PID 3824 wrote to memory of 4252 3824 cmd.exe 107 PID 3824 wrote to memory of 4252 3824 cmd.exe 107 PID 3824 wrote to memory of 1084 3824 cmd.exe 108 PID 3824 wrote to memory of 1084 3824 cmd.exe 108 PID 1816 wrote to memory of 1840 1816 chrome.exe 109 PID 1816 wrote to memory of 1840 1816 chrome.exe 109 PID 1840 wrote to memory of 4324 1840 cmd.exe 111 PID 1840 wrote to memory of 4324 1840 cmd.exe 111 PID 1816 wrote to memory of 4168 1816 chrome.exe 115 PID 1816 wrote to memory of 4168 1816 chrome.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\dead.exe"C:\Users\Admin\AppData\Local\Temp\dead.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:4408
-
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:4252
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:1084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:4324
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\readme.txt3⤵
- Opens file in notepad (likely ransom note)
PID:4168
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:816
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5b3b5313f4d4d239f5d22a84ef29eb892
SHA1ac0dd7326305bfee3d19b31ee56c9cbc9b3253f5
SHA2567df566bbfebbfb07e45989d68668365c56d17d55b013bb30c58de0485d337067
SHA512c68ead18d282247be06d05c235dc7c07ab9871358b42e9f5756aa2e43bc694dd34a5288b65d1d4d9a0092ca162f3c9aa8d7ca5f6b47ed46973a31b6334a8ba57
-
Filesize
2.2MB
MD5b3b5313f4d4d239f5d22a84ef29eb892
SHA1ac0dd7326305bfee3d19b31ee56c9cbc9b3253f5
SHA2567df566bbfebbfb07e45989d68668365c56d17d55b013bb30c58de0485d337067
SHA512c68ead18d282247be06d05c235dc7c07ab9871358b42e9f5756aa2e43bc694dd34a5288b65d1d4d9a0092ca162f3c9aa8d7ca5f6b47ed46973a31b6334a8ba57
-
Filesize
1KB
MD512a0f95a46741c7e7ac4c13c50f5bf53
SHA1538852ccd570c26fd60e27d22f85a0052fe8abb4
SHA25632ce1bdf2a7acac6e7cbefd6c343e798f5238a520a3e7e4ee1e2e72a7ac1f590
SHA51213db34ebdfb9892e71dfe7ac1ebd42da29b4bcc26327ab50d04eb833cf29a43a302db5e450ccc31cdff0bf69e3b035900372c15843056685c855e591d1c95351